Behavioral task
behavioral1
Sample
0a7b3a75b84d88b6b57ae71c87fc6e40_JaffaCakes118.doc
Resource
win7-20240319-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0a7b3a75b84d88b6b57ae71c87fc6e40_JaffaCakes118.doc
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
0a7b3a75b84d88b6b57ae71c87fc6e40_JaffaCakes118
-
Size
133KB
-
MD5
0a7b3a75b84d88b6b57ae71c87fc6e40
-
SHA1
ced3cc50ea67601cf7bf72b5969bc368e45f1f09
-
SHA256
b3c801531e058de3449eae1a0e996ec65311db9c09924021c647acf792ab3641
-
SHA512
90a00aa3de7f1b544cc8ef8ac244262a63f032ad97d79ca5f36d8baaec478ef05615426151b6bde0cf39acabae8f53e277f124ae514503345df1be547dab215c
-
SSDEEP
1536:Qe770K/1JVf9H1KrNDiBtYhLO/nqB2/TWiDUl:Qe3bJB9H1K9i8LOGGTWi0
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0a7b3a75b84d88b6b57ae71c87fc6e40_JaffaCakes118.doc windows office2003
ЭтаКнига
Лист1
Лист2
Лист3
uoerhlf
UserForm1
zvjwhr